1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zubka84 [21]
3 years ago
5

A company is executing a strategy to encrypt and sign all proprietary data in transit. The company recently deployed PKI service

s to support this strategy. Which of the following protocols supports the strategy and employs certificates generated by PKI? (Select THREE).
answer choices
S/MIME

TLS

SFTP

SAML

IPSec
Computers and Technology
1 answer:
Nadusha1986 [10]3 years ago
4 0

Answer:

S/MIME

TLS

SFTP

Explanation:

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol that is generally accepted for sending encrypted messages or sign them after encrypting.

TLS is also considered a cryptographic protocol that is known for providing safe and secure communication security over networks and are in most cases used for internet communications.

SFTP also known as SSH or Secure File Transfer Protocol is a network protocol that allows for the transfer, access, and management of files over reliable and secure data stream.

Hence, a company executing a strategy to encrypt and sign all proprietary data transit can use these 3 protocols.

You might be interested in
Calculator Create a program that calculates three options for an appropriate tip to leave after a meal at a restaurant.
dsp73

Answer:

I am writing a Python program:

print("Tip Calculator \n")

bill = float(input("Cost of meal: "))

tip15pc = bill * 0.15

tip20pc = bill * 0.20

tip25pc = bill * 0.25

print("\n15%")

print("Tip amount: %.2f"% (tip15pc))

print("Total amount: %.2f \n" % (bill + tip15pc))

print("20%")

print("Tip amount: %.2f"% (tip20pc))

print("Total amount: %.2f \n" % (bill + tip20pc))

print("25%")

print("Tip amount: %.2f"% (tip25pc))

print("Total amount: %.2f" % (bill + tip25pc))

Explanation:

The program first prints the message: Tip Calculator

bill = float(input("Cost of meal: ")) This statement prompts the user to enter the amount of the bill of meal. The input value is taken as decimal/floating point number from user.

tip15pc = bill * 0.15  This statement calculates the cost of tipping at 15%

tip20pc = bill * 0.20 This statement calculates the cost of tipping at 20%

tip25pc = bill * 0.25 This statement calculates the cost of tipping at 25%

print("\n15%")  This statement prints the message 15%

print("Tip amount: %.2f"% (tip15pc))  this statement displays the amount of tip at 15% and the value is displayed up to 2 decimal places as specified by %.2f

print("Total amount: %.2f \n" % (bill + tip15pc))  This statement prints the total amount by adding the cost of mean with the 15% tip amount.

The program further computes the the amount of tip at 20% and 25%. The resultant values are displayed up to 2 decimal places as specified by %.2f Then the program prints the total amount by adding the cost of mean with the 20%  and 25% tip amounts just as computed for the 15% tip.

The screenshot of the program as well as its output is attached.

4 0
3 years ago
What is the function of series-parallel circuit
wel

Answer:

components are connected end-to-end in a line to form a single path for electron s to flow

Explanation:

If you put morw lamps into serious circuit, the lamps will be dimmer than they were before.

6 0
4 years ago
An example of cooler red is
BARSIC [14]

apple, stop sign, fire truck, stop light... ect

6 0
4 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Which statement regarding socializers is true?
allochka39001 [22]

Answer:

The answer is: they are comparable to suit of hearts

Explanation:

The answer is: they are comparable to suit of hearts

7 0
4 years ago
Read 2 more answers
Other questions:
  • Peter recently bought a media player and a digital camera he wants to buy memory card for the devices which memory device should
    10·2 answers
  • Which of the following is NOT true of input validation?
    7·1 answer
  • Your teacher needs to keep track of a biology experiment's results for all students, to
    7·2 answers
  • When you see ####### in a cell, you should​
    11·1 answer
  • When shopping on the web, it is better to pay for your purchase with a debit card rather than a credit card.
    10·2 answers
  • Explain the effects of disposing electronic equipments to the environment ​
    13·1 answer
  • how do i create a program in little man computer that takes 2 numbers, divides them and then outputs the div and mod?
    8·1 answer
  • The first step of converting data into a table is:
    12·1 answer
  • What is the full form of computer​
    13·2 answers
  • Most jobs in computer disciplines require which minimum level of education?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!